Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1802.04633
Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"
50 / 145 papers shown
Title
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
24
5
0
27 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAML
MLAU
52
29
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
27
2
0
14 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
28
1
0
03 Oct 2022
Generative Model Watermarking Based on Human Visual System
Li Zhang
Yong-Jin Liu
Shaoteng Liu
Tianshu Yang
Yexin Wang
Xinpeng Zhang
Han-Yan Wu
29
4
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
25
2
0
29 Sep 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
56
98
0
27 Sep 2022
Solving the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks by Reversing Triggers
Fangqi Li
Shilin Wang
Yun Zhu
AAML
18
1
0
30 Aug 2022
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Tzu-Yun Chien
Chih-Ya Shen
AAML
23
0
0
10 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
46
12
0
04 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
36
21
0
12 Jul 2022
ROSE: A RObust and SEcure DNN Watermarking
Kassem Kallas
Teddy Furon
11
7
0
22 Jun 2022
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
59
5
0
30 May 2022
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples
Lina Lin
Hanzhou Wu
AAML
19
5
0
09 May 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions
M. Rigaki
Sebastian Garcia
AAML
25
10
0
13 Apr 2022
Knowledge-Free Black-Box Watermark and Ownership Proof for Image Classification Neural Networks
Fangqi Li
Shilin Wang
16
1
0
09 Apr 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
33
66
0
17 Feb 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
23
53
0
27 Jan 2022
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
30
58
0
26 Jan 2022
FedComm: Federated Learning as a Medium for Covert Communication
Dorjan Hitaj
Giulio Pagnotta
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
FedML
32
10
0
21 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
33
11
0
20 Jan 2022
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Xudong Pan
Yifan Yan
Mi Zhang
Min Yang
27
23
0
19 Jan 2022
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
Yupei Liu
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
MIACV
16
24
0
15 Jan 2022
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
43
61
0
07 Dec 2021
Protecting Intellectual Property of Language Generation APIs with Lexical Watermark
Xuanli He
Qiongkai Xu
Lingjuan Lyu
Fangzhao Wu
Chenguang Wang
WaLM
180
95
0
05 Dec 2021
Safe Distillation Box
Jingwen Ye
Yining Mao
Mingli Song
Xinchao Wang
Cheng Jin
Xiuming Zhang
AAML
24
13
0
05 Dec 2021
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Vasisht Duddu
S. Szyller
Nadarajah Asokan
32
12
0
04 Dec 2021
Sound and Complete Neural Network Repair with Minimality and Locality Guarantees
Feisi Fu
Wenchao Li
KELM
AAML
41
26
0
14 Oct 2021
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Tian Dong
Han Qiu
Tianwei Zhang
Jiwei Li
Hewu Li
Jialiang Lu
AAML
39
8
0
07 Oct 2021
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning
Ren Wang
Zhe Xu
Alfred Hero
32
0
0
06 Oct 2021
SoK: Machine Learning Governance
Varun Chandrasekaran
Hengrui Jia
Anvith Thudi
Adelin Travers
Mohammad Yaghini
Nicolas Papernot
43
16
0
20 Sep 2021
Protect the Intellectual Property of Dataset against Unauthorized Use
Mingfu Xue
Yinghao Wu
Yushu Zhang
Jian Wang
Weiqiang Liu
38
4
0
16 Sep 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
26
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Anuj Dubey
Rosario Cammarota
Vikram B. Suresh
Aydin Aysu
AAML
33
31
0
01 Sep 2021
Quantization Backdoors to Deep Learning Commercial Frameworks
Hua Ma
Huming Qiu
Yansong Gao
Zhi-Li Zhang
A. Abuadbba
Minhui Xue
Anmin Fu
Jiliang Zhang
S. Al-Sarawi
Derek Abbott
MQ
38
19
0
20 Aug 2021
Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fangqi Li
Shi-Lin Wang
Alan Wee-Chung Liew
24
8
0
20 Aug 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Esha Sarkar
Michail Maniatakos
34
3
0
14 Aug 2021
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
36
87
0
11 Aug 2021
Exploring Structure Consistency for Deep Model Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Han Fang
Zehua Ma
Weiming Zhang
G. Hua
Nenghai Yu
AAML
24
4
0
05 Aug 2021
Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao
Yinzhe Yao
Hanzhou Wu
Xinpeng Zhang
AAML
21
23
0
19 Jul 2021
HODA: Hardness-Oriented Detection of Model Extraction Attacks
A. M. Sadeghzadeh
Amir Mohammad Sobhanian
F. Dehghan
R. Jalili
MIACV
25
7
0
21 Jun 2021
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Suyoung Lee
Wonho Song
Suman Jana
M. Cha
Sooel Son
AAML
27
13
0
18 Jun 2021
Detect and remove watermark in deep neural networks via generative adversarial networks
Haoqi Wang
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
29
12
0
15 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
19
45
0
13 Jun 2021
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Yan Liang
Ziqi Zhang
Bingyan Liu
Ziyue Yang
Yunxin Liu
19
53
0
11 Jun 2021
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution
Fanchao Qi
Yuan Yao
Sophia Xu
Zhiyuan Liu
Maosong Sun
SILM
33
126
0
11 Jun 2021
Previous
1
2
3
Next